You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/tutorials/pages/jupyterhub.adoc
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ options:
86
86
NOTE: The node port IP found in the ConfigMap `keycloak-address` can be used for opening the JupyterHub UI.
87
87
On Kind this can be any node - not necessarily the one where the proxy Pod is running.
88
88
This is due to the way in which Docker networking is used within the cluster.
89
-
On other clusters it might be necessary to use the exact Node on which the proxy is running.
89
+
On other clusters it might be necessary to use the exact node on which the proxy is running.
90
90
91
91
=== Discovery
92
92
@@ -313,8 +313,8 @@ The endpoints can be defined directly under `GenericOAuthenticator` as well, tho
313
313
The demo uses a self-signed certificate that needs to be accepted by JupyterHub.
314
314
This involves:
315
315
316
-
* mounting a secret created with the same secret class as used for the self-signed certificate used by Keycloak
317
-
* make this secret available to JupyterHub
316
+
* mounting a Secret created with the same SecretClass as used for the self-signed certificate used by Keycloak
317
+
* make this Secret available to JupyterHub
318
318
* it may also be necessary to point Python at this specific certificate
319
319
320
320
This can be seen below:
@@ -351,9 +351,9 @@ This can be seen below:
351
351
----
352
352
353
353
<1> Specify which certificate(s) should be used internally (in the code above this is using the default certificate, but is included for the sake of completion)
354
-
<2> Create the certificate with the same secret class (`tls`) as Keycloak
354
+
<2> Create the certificate with the same SecretClass (`tls`) as Keycloak
355
355
<3> Mount this certificate: if the default file is not overwritten, but is mounted to a new file in the same directory, then the certificates should be updated by calling e.g. `update-ca-certificates`
356
-
<4> Ensure python is using the same certificate
356
+
<4> Ensure Python is using the same certificate
357
357
358
358
[#endpoints]
359
359
=== Endpoints
@@ -530,10 +530,10 @@ USER spark
530
530
====
531
531
532
532
NOTE: The example notebook in the demo will start a distributed Spark cluster, whereby the notebook acts as the driver which spawns a number of executors.
533
-
The driver uses the user-specific <<driver, driver service>> to pass job dependencies to each executor.
533
+
The driver uses the user-specific <<driver, driver service>> to pass dependencies to each executor.
534
534
The Spark versions of these dependencies must be the same on both the driver and executor, or else serialization errors can occur.
535
535
For Java or Scala classes that do not have a specified `serialVersionUID`, one will be calculated at runtime based on the contents of each class (method signatures etc.): if the contents of these class files have been changed, then the UID may differ between driver and executor.
536
-
To avoid this, care needs to be taken to use images for the notebook and the Spark job that are using a common Spark build.
536
+
To avoid this, care needs to be taken to use images for the notebook and Spark that are using a common Spark build.
0 commit comments